Useful Links /

Tools

  1. Enumeration and Privilege Escalation
  2. Networking and Web Scraping
  3. Exploitation
  4. Social Engineering + OSINT
  5. Reverse Engineering
  6. Utility
  7. Lists within lists!

Remember the Code of Conduct and the Computer Misuse Act when using these tools. They are to be used for education only, on your own systems or where you are sure you have explicit permission.

Once you’re sure you’re working ethically and within the law… have fun!

Enumeration and Privilege Escalation

Nmap - A tool for enumerating networks, with lots of built in scripts for enriching information - this is the first step in most security assessments!

Gobuster - Insanely fast tool for discovering webpages on a domain - often the first step when exploring a web app

ldapsearch & ldapenum - Tools for enumerating system and domain controllers over LDAP - useful for Windows boxes!

pspy - For monitoring processes on a Linux machine - useful for discovering interesting things post-exploitation!

PrivEsc Scripts Suite- A list of brilliant scripts for enumerating ahead of privelege escalation, including linPEAS and winPEAS. (It pairs nicely with this)

Bloodhound - Brilliant tool for visualising exploitation paths in Active Directory, and suggesting exploits

Networking and Web Scraping

Burp Suite - A powerful tool for capturing and analysing HTTP requests, and modifying them on the fly - this is an essential in your toolkit!

Wireshark - An incredibly powerful tool for analysing network traffic

Beautiful Soup - The essential web scraping library, with great documentation

Scrapy - A powerful web scraping framework

Exploitation

sqlmap - A tool for automatically detecting and performing SQL injection attacks

Metasploit - An extensive set of exploit implementations, downloadable for free via Metasploit Framework

CrackMapExec- A mindblowingly versatile tool used for enumerating and exploiting Windows Machines and Active Directory - with incredible documentation !

Impacket- A collection of brilliant Python Scripts, perfect for pulling secrets out of Windows Machines (and much more) . We used many of these scripts during our Enumeration Session

tomcatWarDeployer - For deploying malicious payloads to compromised Tomcat webservers

Social Engineering + OSINT

Social Engineering Toolkit - A suite of social engineering and OSINT tools, including phishing and fake login pages!

Reverse Engineering

Ghidra - A suite of software reverse engineering tools, developed by the NSA

Utility

Cyberchef - A GCHQ released tool that’s useful for encodings, cryptography and a ton of other useful tools!

jwt - A tool useful for decoding JWT tokens used in web applications

John the Ripper - A great password cracking tool, supporting hundreds of hash and cipher types

Regex101 - A lovely little regex checker, for help with all those greps

JSLinux- Try Linux out in your browser! (Although we recommend installing it properly)

tmux - A video guide to tmux from Ippsec, a useful tool for terminal productivity

HTTPBin - A website for testing HTTP requests

CTF Tools - A work-in-progress repo with various cybersecurity tools, including a password cracker and a repeater, built by Mac

Lists within lists!

Red Teaming Toolkit - A collection of amazing repositories and tools for all your hacking needs

SecLists - Thought this list was long? This repo compiles an egregious number of passwords, URLs, and payloads for fuzzing, password cracking, and everything in between

ExtendsClass - A host of free online developer tools for testing Regexes, API calls, XML validation, and more!